Description
A Blind SQL Injection vulnerability exists in SourceCodester Loan Management System v1.0. The vulnerability is located in the ajax.php file (specifically the save_loan action). The application fails to properly sanitize user input supplied to the "borrower_id" parameter in a POST request, allowing an authenticated attacker to inject malicious SQL commands.
Published: 2026-03-31
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data compromise via unauthorized database manipulation
Action: Apply Patch
AI Analysis

Impact

A blind SQL injection flaw exists in the "save_loan" action of ajax.php. The borrower_id POST parameter is insufficiently sanitized, permitting an authenticated attacker to inject arbitrary SQL. This could allow attacker to read, modify, or delete data from the loan database, potentially exposing sensitive borrower information or altering loan records. The weakness is identified as CWE-89, a classic input validation flaw common in web applications.

Affected Systems

The vulnerability affects the SourceCodester Loan Management System version 1.0. No other product versions or vendors are listed; the CPE string identifies only this single version. The system is a web application that accepts borrower_id via POST to ajax.php.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. EPSS score is less than 1%, indicating low likelihood of exploitation at present. The vendor has not listed it in CISA KEV, but the risk exists for authenticated users who have permission to access the loan submission endpoint. Since the exploitation path requires authentication, the attack vector is likely internal or privileged access; an attacker with legitimate user credentials could trigger the vulnerable query. There is no publicly released exploit, but the blind nature means detection relies on behavioral observation rather than error messages.

Generated by OpenCVE AI on April 6, 2026 at 16:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Enforce strict input validation on borrower_id, allowing only numeric characters or safe types, and use parameterized queries.
  • Apply any vendor‑released patch for the Loan Management System 1.0 when available.
  • Restrict access to the ajax.php save_loan endpoint to authenticated users with minimal privileges.
  • Monitor database activity for anomalous queries and review logs for signs of exploitation.
  • Disable detailed error messages to prevent information disclosure.

Generated by OpenCVE AI on April 6, 2026 at 16:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Title Blind SQL Injection in SourceCodester Loan Management System 1.0

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Blind SQL Injection in SourceCodester Loan Management System 1.0

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 loan Management System
CPEs cpe:2.3:a:oretnom23:loan_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 loan Management System

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Blind SQL Injection in SourceCodester Loan Management System v1.0 Allowing Authenticated Attacker to Execute Arbitrary SQL

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Blind SQL Injection in SourceCodester Loan Management System v1.0 Allowing Authenticated Attacker to Execute Arbitrary SQL
First Time appeared Sourcecodester
Sourcecodester loan Management System
Weaknesses CWE-89
Vendors & Products Sourcecodester
Sourcecodester loan Management System
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description A Blind SQL Injection vulnerability exists in SourceCodester Loan Management System v1.0. The vulnerability is located in the ajax.php file (specifically the save_loan action). The application fails to properly sanitize user input supplied to the "borrower_id" parameter in a POST request, allowing an authenticated attacker to inject malicious SQL commands.
References

Subscriptions

Oretnom23 Loan Management System
Sourcecodester Loan Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-06T13:50:08.064Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30520

cve-icon Vulnrichment

Updated: 2026-03-31T20:42:38.323Z

cve-icon NVD

Status : Modified

Published: 2026-03-31T18:16:47.560

Modified: 2026-04-06T14:16:22.937

Link: CVE-2026-30520

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:08:20Z

Weaknesses